Security, Privacy Cryptography
Enterprise IT is not structured to have the time and money to invest in far-reaching and forward-looking security threats and solutions. Academic and government research in these areas thrive, but does not easily find its way into industry. Red Hat’s open source approach allows researchers to share their work immediately and have it reviewed by thousands of security experts. This review further hardens the work and allows it to be put to use more quickly and more broadly so research and inventions in cryptography, privacy and cybersecurity have immediate impact.
Projects
Project | Summary | Research Area | RIG | Universities | rig_hfilter | partner_university_hfilter |
---|---|---|---|---|---|---|
Disinformation Detection at Scale | The increased prevalence of fake and manipulated visual media on the Internet has led to social and technical dilemmas in … | AI-ML, Security, Privacy, Cryptography | Greater New England | UNICAMP - Universidade Estadual de Campinas, University of Notre Dame | greater-boston | unicamp-universidade-estadual-de-campinas university-of-notre-dame |
Creating a global open research platform to better understand social sustainability using data from a real-life smart village | In this project, a team of BU faculty will team up with Red Hat researchers and with SmartaByar, an organization … | AI-ML, Cloud-DS, Security, Privacy, Cryptography | Greater New England | Boston University | greater-boston | boston-university |
Privacy-Preserving Cloud Computing using Homomorphic Encryption | In today’s data-driven world, a large amount of data is collected by billions of devices (cell phones, autonomous cars, handheld … | Cloud-DS, Hardware and the OS, Security, Privacy, Cryptography | Greater New England | Boston University | greater-boston | boston-university |
Symbiotes: A New step in Linux’s Evolution | This work explores how a new kind of software entity, a symbiotie, might bridge this gap. By adding the ability for application software to shed the boundary that separates it from the OS kernel it is free to integrate, modify and evolve in to a hybrid that is both application and OS. | Hardware and the OS, Security, Privacy, Cryptography | Greater New England | Boston University | greater-boston | boston-university |
Secure cross-site analytics on OpenShift logs | The project aims to explore whether cryptographically secure Multi-Party Computation, or MPC for short, can be used to perform secure cross-site analytics on OpenShift logs with minimum client participation. | Cloud-DS, Security, Privacy, Cryptography, Testing and Ops | Greater New England | Boston University | greater-boston | boston-university |
Are Adversarial Attacks a Viable Solution to Individual Privacy? | Users of online services today must trust platforms with their personal data. Platforms can choose to enable privacy by default … | Security, Privacy, Cryptography | Greater New England | Boston University | greater-boston | boston-university |
Secured API in Hybrid Cloud | Recently we see many companies that are moving their data from local data centers to public-managed clouds. But with these movements, some questions raise up. | Security, Privacy, Cryptography | Israel | Ariel University | tel-aviv | ariel-university |
Side-channel attacks on embedded devices and smartcards | This project focuses on several aspects of side-channel attacks on embedded devices and smartcards, utilizing timing, power-analysis and other side-channels. … | Security, Privacy, Cryptography | Europe | Masaryk University | brno | masaryk-university |
Mining issued Common Criteria and FIPS140-2 certificates | The security certification reports might be long but is also a trove of publicly available data about otherwise proprietary devices … | Security, Privacy, Cryptography | Europe | Masaryk University | brno | masaryk-university |
Verifying constant-time cryptographic algorithm implementations | The aim of this project is to verify the timing side-channel resistance of cryptographic implementations. The project focuses on the constant time (and constant memory access) generic cryptographic implementations of selected cryptographic algorithms. T | Security, Privacy, Cryptography | Europe | Masaryk University | brno | masaryk-university |
Trusted Computing Ecosystem | The project aims to study the TPM ecosystem as currently exists in deployed devices and software applications using it, establish the types of chips and their properties one can encounter, investigate the state of patching of known vulnerabilities like ROCA against Infineon’s TPM (CVE-2017-15361) or TPMFail against Intel’s fTPM (CVE-2019-11090) and STM’s TPM (CVE-2019-16863) and analyze a reliability of stored integrity measurements (PCRs) for remote attestation and disk encryption uses. | Security, Privacy, Cryptography | Europe | Masaryk University | brno | masaryk-university |
Improving Full Disk Encryption | The primary focus of this project is also data integrity protection, either in combination with encryption (authentication encryption) or standalone using dm-integrity and dm-verity kernel driver. | Security, Privacy, Cryptography | Europe | Masaryk University | brno | masaryk-university |
Accelerating Microarchitectural Security Research | We are working on processes and tooling to lower the barrier to entry into the field and accelerate attack research and mitigation across academia and industry. | Security, Privacy, Cryptography | Europe | Graz University of Technology | brno | tu-graz |
Authentication in public open-source repositories | This project focuses on user authentication in public repositories containing open-source projects, which are then used by commercial companies (e.g. Red Hat) as a source for their internally maintained repositories. | Security, Privacy, Cryptography | Europe | Masaryk University | brno | masaryk-university |
PACT: Private Automated Contact Tracing | Security, Privacy, Cryptography | Greater New England | Boston University | greater-boston | boston-university | |
OpenInfra Labs | OpenInfra Labs is an OpenStack Foundation project connecting open source projects to production to advance open source infrastructure. The project … | AI-ML, Cloud-DS, Hardware and the OS, Security, Privacy, Cryptography, Testing and Ops | Boston University, Northeastern University, UMass Amherst | boston-university northeastern-university umass-amherst | ||
Elastic Secure Infrastructure | This project encompasses work in several areas to design, build and evaluate secure bare-metal elastic infrastructure for data centers. | Cloud-DS, Security, Privacy, Cryptography, Testing and Ops | Greater New England | Boston University | greater-boston | boston-university |
Open Cloud Testbed | The Open Cloud Testbed project will build and support a testbed for research and experimentation into new cloud platforms – the underlying software which provides cloud services to applications. Testbeds such as OCT are critical for enabling research into new cloud technologies – research that requires experiments which potentially change the operation of the cloud itself. | AI-ML, Cloud-DS, Hardware and the OS, Security, Privacy, Cryptography, Testing and Ops | Greater New England | Boston University, Northeastern University, UMass Amherst | greater-boston | boston-university northeastern-university umass-amherst |
Implementing Secure Multi-Party Computing | Secure Multiparty Computation (MPC) is a cryptographic primitive that allows several parties to jointly and privately compute desired functions over secret data. Building and deploying practical MPC applications faces several obstacles, including performance overhead, complicated deployment and setup procedures, and adoption of MPC protocols into modern software stacks. MPC applications expose trade-offs between efficiency and privacy that may be hard to reason about, formally characterize, and encode in a protocol design or implementation. | Cloud-DS, Security, Privacy, Cryptography | Greater New England | Boston University | greater-boston | boston-university |
Usable Security for Developers | This project focuses on the cryptographic APIs with respect to their developer usability. Such APIs are notoriously complex and prone to usage errors – our goal is to analyze their (in)correct usage and propose precautions and guidelines to achieve better usability and security. | Security, Privacy, Cryptography | Europe | Masaryk University | brno | masaryk-university |
Fuzzing Device Emulation in QEMU | Hypervisors—the software that allows a computer to simulate multiple virtual computers—form the backbone of cloud computing. Because they are both ubiquitous and essential, they are security-critical applications that make attractive targets for potential attackers. | Hardware and the OS, Security, Privacy, Cryptography, Testing and Ops | Greater New England | Boston University | greater-boston | boston-university |